SecurityMicrosoft Reports OAuth Application Attack23 September 2022Microsoft reported a recently investigated attack deploying malicious OAuth applications on compromised cloud tenants to control Exchange…
InsightsThe Do’s and Don’ts of SQL Server Virtualization19 September 2022Virtualization is everywhere today and has become an expected practice for mission-critical applications. By migrating SQL Server to a…
SecurityWhat is Ransomware-as-a-Service (RaaS) and How to Protect Your Data12 September 2022It’s no secret that the underground world of bad actors that wreak havoc on businesses through ransomware, phishing, and malware has been…
InsightsHow IT Managers are Using M365 Dynamics in 20227 September 2022Microsoft released the Azure-based Dynamics 365 in 2016 when it combined customer relationship management (CRM) and enterprise resource…
Insights Top New Microsoft Teams Features in 202229 August 2022Microsoft Teams was released in 2016 and quickly became a key part of the Office 365 suite. Several years later, effective workplace…
SecurityAiTM Phishing: A Novel Large-Scale Phishing Campaign Targeting Executives24 August 2022Threat actors targeting corporate executives have developed a new large-scale email phishing campaign using spear-phishing in tandem with…
M365M365 Backup: Top 5 Mistakes of IT Managers22 August 2022Microsoft 365 continues to be a powerhouse in the productivity realm: As of November 2021, it boasted 50.2 million subscribers and generated…